5 research outputs found

    Intelligence and Security Informatics

    Get PDF
    The book constitutes the proceedings of the First European Conference on Intelligence and Security Informatics, EuroISI 2008 Intelligence and security informatics (ISI) is a multidisciplinary field encompassing methodologies, models, algorithms, and advanced tools for intelligence analysis, homeland security, terrorism research as well as security-related public policies. These proceedings contain 25 original papers, out of 48 submissions received, related to the topics of intelligence and security informatics. These papers cover a broad range of fields such as: social network analysis, knowledge discovery, web-based intelligence and analysis, privacy protection, access control, digital rights management, malware and intrusion detection, surveillance, crisis management, and computational intelligence, among others.JRC.G.2-Support to external securit

    Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests

    No full text
    The ICT security assessment of critical infrastructures is nowadays a prominent problem. All the existing risk assessment methodologies require, in order to be effective, to be fed with real data regarding the functioning and the behavior of the system under analysis, the results and the effects of the possible cyber-attacks etc. Unfortunately the availability of such data is scarce and the unique way to obtain them is by conducing on-field experiments. In this paper we present a methodology which define, step by step, how to conduce, in a systematic,rigorous and Galilean way, experimental ICT security tests.JRC.G.6-Sensors, radar technologies and cybersecurit

    Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests

    No full text

    Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests

    No full text

    Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests

    No full text
    The security assessment of the ICT components of critical infrastructures is nowadays a prominent problem. Risk assessment methodologies require, in order to be effective, to be fed with data regarding the functioning and the behavior of the system under analysis, the potential vulnerabilities, the results and the effects of the possible cyber-attacks etc. Unfortunately the availability of security data coming from the field is scarce, mainly due to business confidentiality reasons. Therefore, there is an urgent need for alternative data sources. The solution is to conduct security experiments, with off-line systems or in laboratories with realistic emulation of the target systems. In this paper we present a methodology that defines, step by step, how to conduct, in a systematic and rigorous way, experimental ICT security tests.JRC.G.6-Security technology assessmen
    corecore